Microsoft acquires Express Logic for its real-time internet of things operating system

CTOvision

Microsoft today announced that it’s acquired Express Logic, a 23-year-old San Diego, California-based developer of real-time operating systems (RTOS) for the internet of things (IoT) and edge devices powered by microcontroller units (MCUs), for an undisclosed amount.

GE unveils the industrial internet operating system

Computer Weekly

The GE Predix platform is now positioned as an operating system to run industrial machines more efficiently

the future of the Operating System - LinuxCon 2015 keynote

SPF13

The Future of the Operating System. What is an Operating System ? Operating Systems & Apps Over Time. OS in 1960s • IBM OS/360 – First OS that kept track of system resources (program, memory, storage) • CTSS – Introduce scheduling • Univac Exec 8, Burrows MCP, Multics. 1995 - 2005 Dawn of the Internet Era. Linux + Docker 
 is the Future of Operating Systems. Given as a keynote at LinuxCon + CloudOpen Japan 2015.

Update On The Megatrend of the Internet of Things

CTOvision

In this post we dive deeper into the Internet of Things. Today's Internet connects people, governments, academia and business. The already emerging Internet of Things goes far beyond that. Bob Gourley. There are seven key megatrends driving the future of enterprise IT.

The CTOvision Mobile App: Track tech topics anywhere anytime on iOS and Android

CTOvision

Artificial Intelligence Big Data Cloud Computing CTO Cyber Security Internet of Things Mobile News Android (operating system) App Store (iOS) Google Google Play iOS ipad IPhone Mobile appBob Gourley.

Mobile 146

Even Windows XP Got a Patch

CTOvision

The recently discovered vulnerability in Internet Explorer raised quite an uproar with the media and techies in April. The big question surrounding the vulnerability – besides how much vulnerable information it provided hackers – was whether or not Microsoft would provide assistance to Windows XP users, as the company officially stopped providing technical support for the operating system a few weeks ago. By ShannonPerry.

Robot Chef Brings Internet of Things Into the Kitchen

CTOvision

Eventually, home chefs will be able to use a motion capture system to "teach" the robot new recipes, or download them from an iTunes-like service. It will be connected to the Internet, and will be controllable via smartphone. The hands themselves are sophisticated creations, made up of 24 motors, 26 micro-controllers, and 129 sensors, with a sophisticated operating system called ROS.

Google: Innovating in AI but can they catch up with cloud leaders?

CTOvision

From an enterprise IT standpoint, their championing of the Android operating system has earned them a place in the mobility domain, and their Google Apps offering helped show many businesses that the cloud can work for office automation. Google segment includes Internet products, such as Search, Ads, Commerce, Maps, YouTube, Apps, Cloud, Android, Chrome, Google Play, and hardware products, including Chromecast, Chromebooks and Nexus, which are sold by the Company.

Why Do Spammers Love The Internet Of Things?

CTOvision

Inbox providers, inbound and outbound spam filters, ISPs, and blacklist operators constantly strive to reduce the number of spam emails that end up in users’ inboxes. The Internet of Things is the marketing term for those devices. Most aren’t the laptops, tablets, and phones we think of as using the internet: they’re appliances like routers, fridges, cameras, and a million others, each of which is equipped with storage space, an operating system, and a connection to the internet.

The Next Step in the Internet of Things: Connecting Your Home

CTOvision

The Internet of Things is the catch-all phrase used to discuss a vast array of various now-connected objects that may or may not want to talk to one another. Google unveils Brillo, an operating system for Internet of Things (liliputing.com). The post The Next Step in the Internet of Things: Connecting Your Home appeared first on CTOvision.com. Internet of Things News Apple Inc. Remember that "futuristic" movie from 1999 called "Smart House?"

Critical Vulnerability Found, Exploited, Patched in Internet Explorer

CTOvision

Microsoft acknowledged a zero day vulnerability in Internet Explorer – the default web browser for many computers, laptops, and tablets – in a security advisory released last weekend. Vulnerable Internet Explorers include versions 6, 7, 8, 9, 10, and 11. The vulnerability presents a particular threat to PC owners who still use Windows XP, as Microsoft stopped providing technical support for the old operating system in April. But patching systems requires actions.

20 Reasons Why the Internet of Things will be Big and Important

Social, Agile and Transformation

20 Reasons Why the Internet of Things will be Big and Important. How big and important will the internet of things and machine to machine technologies be over the next 5-10 years? Wikibon projected the spend on the Industrial Internet to grow from $20.

Top 5 Internet Security Tips

Galido

Internet security has become a hot topic of debate today, and his really comes as little surprise given the large amounts of devastating malware attacks users are experiencing all around the globe. Internet Protection Software.

Why Big Data And The Internet of Things Are A Match Made In Heaven

CTOvision

Today, we’re going to talk about the Internet of Things and Big Data. We’ll start by dispelling some of the mysticism and hearsay surrounding the Internet of Things. What Exactly IS The Internet of Things? About how it’ll help businesses paint a more complete picture of their operations, employees, and consumers. This leads to a more precise and accurate monitoring and control of physical systems.". The Internet of Things is still a relatively new concept.

Naturally Better Security: Leveraging the power of nature to enhance Internet security

CTOvision

Nature is now providing engineers with the missing link that can help with the most vexing challenge of our age: enabling both security and functionality in our interconnected IT systems. Attacks can even impact the safety of our cars, as hackers have shown they can successfully take over systems embedded in vehicles, and entire airports have been shut down by assaults against the aviation industry. The use cases for a Trusted Security Foundation touch every user of the Internet.

5 Steps to Deploying Windows 8 with System Center 2012 Service.

IT Pros Rock!

Be an Early Expert on Windows Server 2012, Hyper-V Server, System Center 2012, Azure and Windows 8. Hyper-V.nu - Powered by System Center. System Center 2012. 5 Steps to Deploying Windows 8 with System Center 2012 Service Pack 1 - Migration and Deployment - Part 3 of 19. 5 Steps to Deploying Windows 8 with System Center 2012 Service Pack 1 - Migration and Deployment - Part 3 of 19. Add Operating System Image. Internet Information Services ( IIS ).

System 130

Data Security and its Importance on the Internet

Galido

Information Technology Blog - - Data Security and its Importance on the Internet - Information Technology Blog. Below are some useful tips on protecting yourself and knowing about data security and why it is important to protect yourself on the Internet. Keep Systems Updated.

Internet Explorer is Dead: Time for Legacy System Modernization

Geneva Technical Services

As of mid-January, Internet Explorer versions 8, 9, and 10 have been permanently retired. Microsoft will be dumping their legacy system in favor of an all new browser: Microsoft Edge. And for any business that is reluctant to embrace legacy system modernization, this significant change should be a wakeup call. The Problem with Obsolete Legacy Systems. BPM Forum predicts that businesses nationwide lose billions due to inefficient legacy systems.

Former VMware CTO Joins CloudFlare as Head of Engineering

Data Center Knowledge

Wants to help build always-on "Internet Operating System" at the edge of the network Read More. Shared

IDG Contributor Network: How to bring true interoperability to the Internet of Things

Network World

The Internet of Things (IoT) is an incredibly diverse space, encompassing a large variety of hardware form factors and software ecosystems unlike anything we have seen in technology. How do they keep up with updated or new operating systems? Smartwatches, connected cameras, drones, thermostats, voice-enabled speakers, smart appliances and more—they all live together within the IoT. RELATED: 8 tips for building a cost-effective IoT sensor network.

A Decade of Dynamo: Powering the next wave of high-performance, internet-scale applications

All Things Distributed

About 70 percent of operations were of the key-value kind, where only a primary key was used and a single row would be returned. About 20 percent would return a set of rows, but still operate on only a single table. Manageable – The service would need to be easy to manage and operate.

Is Apple due for an antitrust probe?

IT Toolbox

They were sued because they were trying to force the windows operating system users to use internet explorer over and above other browsers. Microsoft was claiming that the internet explorer program was an integral part of the operating system and couldn'tI am sure you have heard of how Microsoft was placed under an antitrust probe and lost (minds out of the gutter please).

Apple 100

AWS Elastic Beanstalk: A Quick and Simple Way into the Cloud - All.

All Things Distributed

Werner Vogels weblog on building scalable and robust distributed systems. Flexibility is one of the key principles of Amazon Web Services - developers can select any programming language and software package, any operating system, any middleware and any database to build systems and applications that meet their requirements. a Fast and Scalable NoSQL Database Service Designed for Internet Scale Applications. All Things Distributed.

Clarification on Security Advisory 2896666 and the ANS for the November 2013 Security Bulletin Release

IT Pros Rock!

The Critical updates address vulnerabilities in Internet Explorer and Microsoft Windows, and the Important updates address issues in Windows and Office. In the meantime, the advisory includes a Fix it which prevents the attacks from succeeding and we recommend customers apply it to help protect their systems. There are three ways you can have the GDI+ component installed on your system: Office, Windows, and Lync. Advisory Windows ANS Internet Explorer (IE) Microsoft Office

Authenticity and the November 2013 Security Updates

IT Pros Rock!

and Internet Explorer 11, and now we''re providing an update to disable its use in other operating systems as well. Today, we released eight bulletins, three Critical and five Important, addressing 19 unique CVEs in Microsoft Windows, Internet Explorer, and Office.

Why bother with firewalls?

IT Toolbox

Every modern operating system has firewalls installed by default these days and even the average modem has a firewall built in. In short, just about every computer under the sun has some sort of firewall built in and you cannot access the internetI get the purpose of firewalls. They are supposed to block people and connections from doing things they are not supposed to do.

Enterprise IoT threatens to undermine cloud and IT security

David Linthicum

The internet of things, or IoT, is pervasive these days in your personal life. Well, for example, as thermostats and sensor fail in buildings’ HVAC systems, they are often replaced with smart devices, which can process information at the device. These new IoT sensor devices often are computers unto themselves; many have their own operating systems and maintain internal data storage. However, this technology is just getting into the Global 2000 companies.

Improbable: Simulation platform technology

CTOvision

Improbable is developing an operating environment that makes building simulated worlds possible. Improbable is developing SpatialOS; a distributed operating system that makes building simulated worlds possible. Research Team.

Using Secure Configurations | Standardize Your Security

Linux Academy

Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc.

Endpoint device management: Protecting the enterprise front door

Cloud Musings

Jackson: Sounds like your day job is the Internet of Things. With the advent of this new vision of the Internet what has changed with respect to security on these new types of end points? Some have predicted that 50 billion devices and objects will be connected to the Internet by 2020.

Get TotalAV Essential AntiVirus for $19.99 (80% off)

Network World

The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires.

Study 43

Get TotalAV Essential AntiVirus for $19.99 (80% off)

Network World

The term “computer virus” calls to mind imagery of pathogenic creepy-crawlies bringing down a device’s operating system, their flagella wriggling as they multiply into hordes that infiltrate its chips and wires.

Study 40

Interoperability: A Much Needed Cloud Computing Focus

Cloud Musings

Cloud computing transitions information technology (IT) from being "systems of physically integrated hardware and software" to "systems of virtually integrated services".

What is IoT?

Network World

The Internet of Things, at its simplest level, is smart devices - from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the Internet so they can share data, but IoT is far from a simple challenge for IT departments. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.

MicroSoft: Still dominating in enterprise office automation

CTOvision

The Company operates in five segments: Devices and Consumer (D&C) Licensing, D&C Hardware, D&C Other, Commercial Licensing, and Commercial Other. It also offers cloud-based solutions that provide customers with software, services and content over the Internet by way of shared computing resources located in centralized data centers. How to Make Internet Explorer More Secure (If You're Stuck Using It) (pcproactive.net). Bob Gourley.